Intelligence & Surveillance
Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.
1,805 Articles
The PPG Visualized, What the US Kill and Capture Bureaucracy Looks Like
This is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead…
We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking
With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…
Today’s Important Deadline in the ACLU’s Targeted-Killing Transparency Case
Today, more than three years after President Obama announced that he had issued a classified “Presidential Policy Guidance,” commonly known as the PPG, meant to govern the…
Cybersecurity, Elections, and Critical Infrastructure at Home and Abroad
In the last few days, Secretary of Homeland Security Jeh Johnson and Homeland Security Advisor Lisa Monaco have both suggested that in the wake of the DNC hack, the United States…
Towards a Cyber-Security Treaty
The Democratic National Convention (DNC) leaks revealed last week have presumably reminded many Americans to the severe cyber-threats this country is facing. Particularly alarming…
The DNC Hack and Democracy
Last Tuesday, Jack Goldsmith published a remarkable series of tweets about the apparent Russian hack and publication of confidential DNC emails on the eve of the Democratic…
France’s Emergency Powers: The New Normal
France’s latest renewal of its emergency law has made few headlines abroad—except perhaps in Turkey, where President Recep Tayyip Erdogan, fresh from passing his own sweeping…
The Democratic National Committee Hack: Information as Interference
Earlier this month, WikiLeaks released nearly 20,000 e-mails belonging to Democratic National Committee’s top officials, where Senator Bernie Sanders was humiliated and criticized.…
Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill
In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
Donald Trump’s Wall, David Rieff’s Long War, and the Dangers of Fear-Mongering
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
It’s Time to Come to Terms With Secret Law: Part II
On Wednesday, I summarized the findings of my recent study of alleged secret law in the three branches of the US government and my conclusion that secret law is a limited but important…
Theresa May’s Record on Surveillance, Human Rights, and Counterterrorism
Theresa May, Britain’s newly appointed Prime Minister was previously the UK Home Secretary. In that role she fought for expansive state surveillance powers, blamed human rights…